To search, Click below search items.


All Published Papers Search Service


Decentralized Trust in Distributed Networks: a Delegate-based Security Hardening Approach


Jabeom Gu, Jaehoon Nah, Jongsoo Jang


Vol. 7  No. 10  pp. 265-272


Current peer-to-peer (P2P) networks are well defined in their communicating and collaborating mechanisms ? search, share, and retrieve information ? especially when there is a centralized management server. However, these operations provide no con-ve?nient security mechanisms for serverless networks. This paper examines a security hardening approach to limit or prevent iden-tifier attacks between distributed P2P networking nodes without help from a centralized server. This paper introduces the basic concept of security hardening and discusses how it can be realized in distributed P2P networks. This paper provides a brief review of a relevant work from the litera-ture. It is a method of a peer to create a cryptographic ‘trust binding’ with a remote peer easily and instantly without any help of a centralized manager or server, with which the first peer can interpret the cryptographic binding as its trust upon the remote peer. Because the scheme combines peers identifier to the gener-ated trust binding, an attacker cannot do much harm (like mis-routing, corrupting, or dropping communication data transferred between the first and the second peer) to the peers, without breaking the binding. Also presented is a detailed analytic study of the security hardening approach from which the strength of the scheme is discussed. Our analysis shows that once implemented the security hardening can be an important countermeasure against various identifier related attacks in distributed P2P net-works.


Peer-to-peer, security, identifier authentication, unmanaged net-works, security hardening